7.4 C
Friday, November 24, 2017
Home Tags Windows 8

Tag: Windows 8

The problem's still there in Windows 10, so prepare for code re-use attacks A Carnegie-Mellon CERT researcher has discovered the Microsoft broke some use-cases for its Address Space Layout Randomisation (ASLR), designed to block code-reuse attacks.…
US-CERT is warning of a vulnerability in Microsoft’s implementation of Address Space Layout Randomization that affects Windows 8, Windows 8.1 and Windows 10.
Microsoft's anti-exploitation technology has a flaw that makes it "worthless" in some cases.
Microsoft Windows 8 introduced a change in how system-wide mandatory ASLR is implemented.

This change requires system-wide bottom-up ASLR to be enabled for mandatory ASLR to receive entropy.

Tools that enable system-wide ASLR without also setting bottom-up ASLR will fail to properly randomize executables that do not opt in to ASLR.
Microsoft Equation Editor contains a stack buffer overflow,which can allow a remote,unauthenticated attacker to execute arbitrary code on a vulnerable system.
Free upgrades for users of assistive technology will cease at the end of the year.
The malware affects Windows 7 and up to Windows 8.1, the researchers confirmed.
Security experts advise 'immediate' patching of critical DNS client vulnerabilities in Windows 8, 10, and other affected systems.
GPU issues block new Windows versions, but security updates will be provided.
Intel doesn't name names, but Windows 10 on ARM is surely the target of its ire.
The "blue screen of death" lives on thanks to a simple Windows file system bug.
The 1990s called: they want their filepath hack back Until Microsoft patches this problem, use Chrome: a slip in file-path handling allows attacker to crash Windows 7 and Windows 8.1 with a file call.…